New Stories

From FRAUD ASSURE

From Rules Design to Adaptive Learning Systems in Telecom Fraud Control

interview with Shankar Palaniandy

From Rules Design to Adaptive Learning Systems in Telecom Fraud Control

Adaptive and behaviorial learning systems are at the forefront of R&D in telecom fraud management systems.  Here an expert developer explains their usefulness in use cases such as IRSF detection, subscription fraud, application fraud, and voice biometrics.

From FRAUD ASSURE

Protecting 900+ MVNOs around the Globe from IRSF Fraud Pirates

interview with Colin Yates

Telecom fraudsters are seeking a new, more vulnerable path to riches.  Their target: 900+ MVNOs around the globe who generally own no mobile networks, but sell mobile service virtually.  This interview with a fraud control expert explains what steps MVNOs must take to protect themselves from IRSF fraud.

From ANALYTICS

A Big Data Starter Kit in the Cloud: How Smaller Operators Can Get Rolling with Advanced Analytics

interview with Ryan Guthrie

Medium to small operators know “big data” is out there alright, but technical staffing and cost issues have held them back from implementing it.  This interview discusses the advantages of moving advanced analytics to the cloud where operators can get up and running faster and at lower cost.

More Stories

Insider Fraud: How to Create an Anti-Fraud Culture in Your Telecom Organization From FRAUD ASSURE

Insider Fraud: How to Create an Anti-Fraud Culture in Your Telecom Organization

interview with Mark Yelland

Thirteen years after the WorldCom scandal, experts generally agree that insider fraud remains a massive problem in telecom.  In this article you’ll learn the outlines of building a program to instill an anti-fund culture at your telecoms organization.

From ORGANIZATION

The Bluejay Speaks: How to Rise above the Chatter, Grow Followers, and Deliver Rich, Powerful Content on the Web

interview with Michael Bluejay

Telecom professionals need to constantly hone their web communication and marketing skills.  Here we interview a high Google ranking website author who shows how to communicate with power on any subject via the web.

IRSF Protection: Software that Blocks Telecom Fraud at the Enterprise PBX From FRAUD ASSURE

IRSF Protection: Software that Blocks Telecom Fraud at the Enterprise PBX

interview with Roger Ansin

The richest criminal path to International Revenue Share Fraud (IRSF) goes through the enterprise PBX.  Hijacking the PBX has cost businesses and telecoms countless billions of dollars in the past 15 years.  In this interview you’ll learn about this industry challenge and an affordable and proven tool that blocks IRSF at the enterprise.

Combating SIM Box Fraud: Network Protocol Analysis to the Revenue Rescue From FRAUD ASSURE

Combating SIM Box Fraud: Network Protocol Analysis to the Revenue Rescue

interview with Lex Wilkinson

International call bypass is fraud perpetrated through SIM boxes equipped with dozens to hundreds of SIM cards that disguise international calls as local domestic phone calls.  This article give a backgrounder on SIM box detection techniques and talks about a new, rapid-detection technology based on network protocol analysis.

Making the Retail Operator Case for Anti-Fraud Protection via Wholesalers From FRAUD ASSURE

Making the Retail Operator Case for Anti-Fraud Protection via Wholesalers

interview with Jan Dingenouts

Small retail operators are highly vulnerable to fraud, so enlisting the anti-fraud assistance of wholesalers is a great idea.  This interview explains useful negoiating tactics for retail operators and shows how wholesalers can lend support and grow their business at the same time.

A Wholesaler’s Fraud Prevention Creed: If You Lose the Trust, You Lose the Traffic From FRAUD ASSURE

A Wholesaler’s Fraud Prevention Creed: If You Lose the Trust, You Lose the Traffic

interview with Robert Benlolo

Large wholesalers play a major role in keeping a lid on international telecom fraud.  In this interview, a wholesale voice and fraud management expert explains the role of its vendor systems and multi-threaded internal processes in protecting customers from fraud losses and shady wholesale suppliers.

Telecom Fraud & Credit Protection: A Desperate Need in Unbanked Regions of the World From FRAUD ASSURE

Telecom Fraud & Credit Protection: A Desperate Need in Unbanked Regions of the World

interview with Luke Taylor

Mobile money plus related fraud and credit protection are crucial to the prosperity of developing nations where most “unbanked” people live.  This article discusses the special issues of the unbanked market as well as broader revenue protection challenges and opportunities.

Recent Articles

  • From Rules Design to Adaptive Learning Systems in Telecom Fraud Control interview with Shankar Palaniandy — Adaptive and behaviorial learning systems are at the forefront of R&D in telecom fraud management systems.  Here an expert developer explains their usefulness in use cases such as IRSF detection, subscription fraud, application fraud, and voice biometrics.
  • Protecting 900+ MVNOs around the Globe from IRSF Fraud Pirates interview with Colin Yates — Telecom fraudsters are seeking a new, more vulnerable path to riches.  Their target: 900+ MVNOs around the globe who generally own no mobile networks, but sell mobile service virtually.  This interview with a fraud control expert explains what steps MVNOs must take to protect themselves from IRSF fraud.
  • A Big Data Starter Kit in the Cloud: How Smaller Operators Can Get Rolling with Advanced Analytics interview with Ryan Guthrie — Medium to small operators know “big data” is out there alright, but technical staffing and cost issues have held them back from implementing it.  This interview discusses the advantages of moving advanced analytics to the cloud where operators can get up and running faster and at lower cost.
  • Insider Fraud: How to Create an Anti-Fraud Culture in Your Telecom Organization interview with Mark Yelland — Thirteen years after the WorldCom scandal, experts generally agree that insider fraud remains a massive problem in telecom.  In this article you’ll learn the outlines of building a program to instill an anti-fund culture at your telecoms organization.
  • The Bluejay Speaks: How to Rise above the Chatter, Grow Followers, and Deliver Rich, Powerful Content on the Web interview with Michael Bluejay — Telecom professionals need to constantly hone their web communication and marketing skills.  Here we interview a high Google ranking website author who shows how to communicate with power on any subject via the web.
  • IRSF Protection: Software that Blocks Telecom Fraud at the Enterprise PBX interview with Roger Ansin — The richest criminal path to International Revenue Share Fraud (IRSF) goes through the enterprise PBX.  Hijacking the PBX has cost businesses and telecoms countless billions of dollars in the past 15 years.  In this interview you’ll learn about this industry challenge and an affordable and proven tool that blocks IRSF at the enterprise.
  • Combating SIM Box Fraud: Network Protocol Analysis to the Revenue Rescue interview with Lex Wilkinson — International call bypass is fraud perpetrated through SIM boxes equipped with dozens to hundreds of SIM cards that disguise international calls as local domestic phone calls.  This article give a backgrounder on SIM box detection techniques and talks about a new, rapid-detection technology based on network protocol analysis.
  • Making the Retail Operator Case for Anti-Fraud Protection via Wholesalers interview with Jan Dingenouts — Small retail operators are highly vulnerable to fraud, so enlisting the anti-fraud assistance of wholesalers is a great idea.  This interview explains useful negoiating tactics for retail operators and shows how wholesalers can lend support and grow their business at the same time.
  • A Wholesaler’s Fraud Prevention Creed: If You Lose the Trust, You Lose the Traffic interview with Robert Benlolo — Large wholesalers play a major role in keeping a lid on international telecom fraud.  In this interview, a wholesale voice and fraud management expert explains the role of its vendor systems and multi-threaded internal processes in protecting customers from fraud losses and shady wholesale suppliers.
  • Telecom Fraud & Credit Protection: A Desperate Need in Unbanked Regions of the World interview with Luke Taylor — Mobile money plus related fraud and credit protection are crucial to the prosperity of developing nations where most “unbanked” people live.  This article discusses the special issues of the unbanked market as well as broader revenue protection challenges and opportunities.
  • Are Cloud-Based Call Centers the Next Hot Product for the SMB Market? interview with Doron Dovrat — Quality customer service can improve a company’s corporate identity and drive business growth.  But many SMBs are priced out of acquiring modern call center technology.  This article explains the benefits of affordable and flexible cloud-based call centers.
  • Dogfight in the Cloud: Time Warner Cable Maneuvers Its Ethernet & Bigger Footprint to Win Enterprise Biz interview with Jitesh Bhayani — Service provider competition in the U.S. is steadily shifting to the advanced cloud, data center, and connectivity needs of large enterprise. Hear how an MSO has joined the dogfight armed with Ethernet, a national footprint, and SLA guarantees.
  • Flexing the OSS & Network to Support the Digital Ecosystem interview with Ken Dilbeck — The need for telecoms to support a broader digital ecosystem requires an enormous change to OSS infrastructures and the way networks are being managed.  This interview sheds light on these challenges.
  • Crossing the Rubicon: Is it Time for Tier Ones to Move to a Real-Time Analytics BSS? interview with Andy Tiller — Will tier one operators continue to maintain their quilt works of legacy and adjunct platforms — or will they radically transform their BSS architecture into a new  system designed to address the new telecom era?  An advocate for radical transformation discusses: real-time analytics, billing for enterprises, partnering mashups, and on-going transformation work at Telenor.
  • Paradigm Shift in OSS Software: Network Topology Views via Enterprise-Search interview with Benedict Enweani — Enterprise-search is a wildly successful technology on the web, yet its influence has not yet rippled to the IT main stream.  But now a large Middle Eastern operator has deployed a major service assurance application using enterprise-search.  The interview discusses this multi-dimensional topology solution and compares it to traditional network inventory.